全文获取类型
收费全文 | 310篇 |
免费 | 19篇 |
国内免费 | 1篇 |
出版年
2021年 | 3篇 |
2020年 | 3篇 |
2019年 | 12篇 |
2018年 | 12篇 |
2017年 | 9篇 |
2016年 | 8篇 |
2015年 | 5篇 |
2014年 | 14篇 |
2013年 | 65篇 |
2012年 | 5篇 |
2011年 | 3篇 |
2010年 | 9篇 |
2009年 | 6篇 |
2008年 | 3篇 |
2007年 | 9篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2002年 | 7篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 7篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 7篇 |
1993年 | 9篇 |
1992年 | 5篇 |
1991年 | 8篇 |
1990年 | 7篇 |
1989年 | 4篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1983年 | 2篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 3篇 |
1974年 | 3篇 |
1973年 | 4篇 |
1972年 | 3篇 |
1969年 | 2篇 |
1968年 | 5篇 |
1967年 | 2篇 |
1966年 | 3篇 |
1948年 | 2篇 |
排序方式: 共有330条查询结果,搜索用时 31 毫秒
91.
This paper develops a new model for allocating demand from retailers (or customers) to a set of production/storage facilities. A producer manufactures a product in multiple production facilities, and faces demand from a set of retailers. The objective is to decide which of the production facilities should satisfy each retailer's demand, in order minimize total production, inventory holding, and assignment costs (where the latter may include, for instance, variable production costs and transportation costs). Demand occurs continuously in time at a deterministic rate at each retailer, while each production facility faces fixed‐charge production costs and linear holding costs. We first consider an uncapacitated model, which we generalize to allow for production or storage capacities. We then explore situations with capacity expansion opportunities. Our solution approach employs a column generation procedure, as well as greedy and local improvement heuristic approaches. A broad class of randomly generated test problems demonstrates that these heuristics find high quality solutions for this large‐scale cross‐facility planning problem using a modest amount of computation time. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
92.
县政权,是中共政权系统承上启下的一个重要环节。抗战初期,晋察冀边区的县政权建设经历了起步与发展的历程。晋察冀边区的县政权虽属初建,却在探索实践中不断发展,其不仅表现为县政权组织构成和主要职能的组建与嬗变,亦表现为县政权会议制度的创建与改进,都体现了延续与渐变的因时而易的特点。在这过程中,中国共产党坚决实行抗日民主政策,团结社会各阶层,不断扩大民众的民主权利,实行民主决策,促进了敌后抗日根据地的建设,更好地适应了战时变局,为其后的中共县政权建设积累了宝贵的经验。 相似文献
93.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献
94.
Stephan Frühling 《Contemporary Security Policy》2017,38(1):4-25
America’s alliances in Europe and East Asia all involve some institutional cooperation on U.S. nuclear weapons policy, planning or employment—from consultative fora in Asia to joint policy and sharing of nuclear warheads in NATO. Such cooperation is often analyzed through the prism of “extended nuclear deterrence,” which focuses on the extension of U.S. security guarantees and their effect on potential adversaries. This article argues that this underplays the importance of institutional factors: Allies have historically addressed a range of objectives through such cooperation, which has helped to catalyze agreements about broader alliance strategy. The varied form such cooperation takes in different alliances also flows from the respective bargaining power of allies and the relative importance of consensus, rather than perceived threats. The article concludes that nuclear weapons cooperation will remain crucial in successful U.S. alliance management, as allies negotiate their relationship with each other in the face of geostrategic change. 相似文献
95.
Constructing a strict total order for alternatives characterized by multiple criteria: An extension
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Akram Dehnokhalaji Pekka J. Korhonen Murat Köksalan Nasim Nasrabadi Diclehan Tezcaner Öztürk Jyrki Wallenius 《海军后勤学研究》2014,61(2):155-163
The problem of finding a strict total order for a finite set of multiple criteria alternatives is considered. Our research extends previous work by us, which considered finding a partial order for a finite set of alternatives. We merge the preference information extracted from the preference cones and corresponding polyhedral sets, with the information derived from pairwise comparisons of two alternatives, yielding a preference matrix. This preference matrix is used as input to an integer programming model to obtain a strict total order that provides a transitive ranking for the set of alternatives. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 155–163, 2014 相似文献
96.
Separatist terrorism has been a severe problem for Turkey since the mid-1980s. The conventional wisdom contends that economic deprivation in southeastern Turkey is the fundamental reason for the long-running battle against the Kurdish rebels. Considering that there is limited empirical literature on the roots of terrorism in Turkey, yielding conflicting results about the claim that the main cause of terrorism is deprived economic conditions, this study aims to answer whether there is a causal relationship between income inequality and separatist terrorism in Turkey. To this end, the Global Terrorism Data Base for the period of 1973–2006, two Theil indices of pay inequality as proxy for income inequality, and the vector autoregression and Autoregressive Moving Average (ARMA) methods are utilized. The results support the early findings that income inequality, a particular focus in this paper and an essential indicator of economic deprivation, is not a main cause of escalation of separatist terrorism in Turkey. 相似文献
97.
98.
Although a number of studies concerning Turkish defence-growth relation have been published in recent years, little attention is given the demand for Turkish defence expenditure. This is an important issue for understanding which variables contribute to the determination of the demand for military expenditure. However, it is difficult to develop a general theory or a standard empirical approach for the determination of the demand military expenditure. This study models and estimates the demand for Turkish defence expenditure for the period 1951-1998 using autoregressive distributed lag approach to cointegration (ARDL) following the methodology outlined in Pesaran and Shin (1999). This procedure can be applied regardless of the stationary properties of the variables in the sample and allows for inferences on long-run estimates, which is not possible under alternative cointegration procedures. The findings suggest that Turkish defence spending is determined by NATO's defence spending, Greece's defence spending and some security considerations. 相似文献
99.
100.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented. 相似文献